Thursday, January 30, 2025
HomeCyber AttackLockbit Ransomware Group Apologized For the Attack On Hospital for Sick Children

Lockbit Ransomware Group Apologized For the Attack On Hospital for Sick Children

Published on

SIEM as a Service

Follow Us on Google News

Following the hospital’s breach in the middle of December, the LockBit ransomware group has expressed regret and given it a free decryption key.

The Hospital for Sick Children (SickKids) in Toronto was the target of a ransomware attack on December 18 that stopped the institution from accessing several of its vital systems.

“We formally apologize for the attack on sikkids[.]ca and give back the decryptor for free, the partner who attacked this hospital violated our rules, is blocked, and is no longer in our affiliate program.” reads the message published by Lockbit on its Tor leak site.

Apology to SickKids on the LockBit data leak site

Apology to SickKids on the LockBit data leak site

Reports stated that it is well known that the organisation forbids its affiliates from striking healthcare institutions. Its policy prohibits encrypting systems at organizations where a breach could result in deaths.

“It is forbidden to encrypt institutions where damage to the files could lead to death, such as cardiology centers, neurosurgical departments, maternity hospitals, and the like, that is, those institutions where surgical procedures on high-tech equipment using computers may be performed,” state the policies of the ransomware operations.

The Group Blamed the Incident on a Partner

The gang explained why it had blocked the affiliate because one of its members had attacked SickKids in violation of the group’s guidelines.

Patient wait times increased as a result of the incident. SickKids reported that as of December 29th, it had reclaimed access to approximately 50% of its critical systems, including those that had delayed diagnostic and treatment procedures.

The decryptor that the gang claims to have provided are a Linux/VMware ESXi decryptor, as reported by BleepingComputer.

Multiple hospital network systems were affected by the hack, although the healthcare group claims that patient care was unaffected.

“The Hospital for Sick Children (SickKids) is currently responding to a cybersecurity incident affecting several network systems and has called a Code Grey – system failure. The code went into effect at 9:30 p.m. on Sunday, December 18, and is ongoing.” reads the incident notice published by the Hospital.

“The safety and well-being of our patients and their families is our top priority. All patient care is continuing and there is currently no evidence that personal information or personal health information has been impacted.”

As seen by its attack on the Center Hospitalier Sud Francilien (CHSF) in France, where a $10 million ransom was demanded and patient data ultimately disclosed, LockBit has a history of encrypting hospitals and failing to provide encryptors.

Due to the attack on the French hospital, patients were transferred to other hospitals, and surgeries were delayed, putting them at serious risk. Hence, this is not the first time a ransomware group has given a healthcare organization a free decryptor.

Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...